Posts

xssprober: Blazing-Fast XSS Detection

How do i get away with hacking without getting arrested?

Are there any software cracking gurus available for hire?

Have you seen edge threats like voice cloning or GenAI tricks in the wild?

How do I bypass system disabling booting onto development mode on Chromebook?

How to make a MIFARE DESFire EV3 key fob?

Intercepting LDAP With InterceptSuite

Am I on the right track learning cybersecurity tools (Wireshark → Nmap → etc.) or should I change my approach?

free, open-source file scanner

I had a great response on the cyber tool I want to build for software supply chain

Flipper Blackhat August Roundup

in your personal opinion what is the best decoder and encoder site

I'm releasing Hound, my agent-based code analyzer that has earned an actual $15k bug bounty

Bypass DPI on Dorm's wifi.

Hack 4g camera to tap it data

DEFCON 33 RF Village Tactical Flipper Zero: You Have 1 Hour and No Other Equipment

Risk assessment resources

Creating your own Rootkit

Cloning gate fob T433-K6

Why do I get the wrong answer when using hashcat?

Detecting CVE-2025-43300: A Deep Dive into Apple's DNG Processing Vulnerability

The Complete Guide to Vulnerability Scanning (Ethical Hacking)

Anyway to bypass these laundry machines' payment in my apartment?

who had terrible grades in school?

Anyone ever dealt with cruise TV boxes

Does anyone know how to do this to cameras?

My Dream of Becoming a White Hat Hacker.

Sentinelone complete

This is probably a long shot

Hacking the Flum Mello Vape - Cortex M0 / 4MBit Flash / LCD display

A Basic Guide for writing your first malware

DOM-based Extension Clickjacking: Your Password Manager Data at Risk

A Scattered Spider com kid (Noah Urban) whining on X about his 10 year sentence the judge gave him

msenum: Microsoft Account Enumeration Tool

Is it possible to hack every device that’s connected to the Internet?

Mapping Supply Chain Attack Paths for Red Teams (Feedback wanted)

Annamous

Anyone encountered a fake Cloudflare CAPTCHA in the wild?

Hacking legal?

Could someone hack your WiFi router and hack every device that connects to it

How To Bypass some Wifi Restrictions?

Ai for Ethical Hacking instructor. 👩‍🏫

Anyway to make JohnTheRipper or Hashcat a little more usable on a VM?

What still breaks in payments? DEF CON wrap-up from Payment Village

AI-supported cyberattacks: experts observe increasing use of LLM

New Study Warns of Security Risks in Cloud Quantum Computers

🚀 Evil-Cardputer v1.4.3 — with NEW CCTV Toolkit!

Canada’s attack surface by the numbers. Basics still win

🔓 Part 3 of my Hardware Hacking Series: Building the Complete Test System, Flashing Firmware & Adding Users 🚀

Releasing Mach - a web fuzzing tool designed for massive workloads

Don’t click this link

Taking down Scam sites

MAC Spoofing

The thought process... (YT)

Looking for 2024 lulu Hypermarket breach

Tea on her app - leaking data

What is possible with an email address?

Where Can I Meet/Make Hacker Friends

I hacked ai my being too human and it gave me the prompt for creating drift

Best AI web scraping tools that don’t suck? no scams pls

Is the World Adopting Post-Quantum Cryptography Fast Enough?

How to speed up Param Miner to scan for headers

[ Removed by Reddit ]

Your Crypto Isn’t Safe — iOS Worm Spreads Over Wi-Fi

Sooo, I made an "usb"

Active Directory Enumeration – ADWS

U.S. Seizes $1M from Russian Cyber Gang, Columbia University Data Leak, WinRAR Zero Day Vulnerability

From medieval stronghold to cyber fortress: shielding Europe’s digital future

Analyzing a Phishing Payload

i want to become a red/white hat how could i do that

NAT on VMs?

Hydra confusion

Free, hands-on, 14 weeks cybersecurity course from the Czech Technical University opened for the public online

iOS app prevent http traffic from being intercepted through BurpSuite proxy, any workaround for this?

Scanned top 10k used HuggingFace models to detect runtime backdoors

Is it a security risk to purchase a TPM module for my motherboard?

Reverse engineering QR codes

🔍 Found this amazing free file search engine! Perfect for finding Mega files instantly.

looking for virtual boxes to try and hack.

Want a community to learn the skills

India Records Highest Average Cost of a Data Breach at INR 220 million in 2025: IBM Report

Would it be legal to ask if anyone has built an algorithm to make millions of fake, yet real looking ICE applications?

Found on my rental car. Is this legit? Are we at this level now?

How to not be tracked by productivity monitoring

Where to find breaches

NFC, wallets, ATMs, BLE, POS systems — Payment Village is back at DEF CON with more stuff to break

Is Arcai netcut safe for android?

GoHPTS - Transparent arpspoof proxy with TCP/UDP support

Part 2 of my YT Hardware Hacking Series

Will this work

Watch Dogs Is Now Real

From Laptops to Laundromats: How DPRK IT Workers Infiltrated the Global Remote Economy

In case you are interested in voltage glitching...